CNT Final Questions
Which of the following is a characteristic of a switched logical topology? (Choose all that apply.) Select one or more: a. Uses a physical bus topology b. Creates dynamic connections c. Sometimes called a shared-media topology d. Uses a physical star topology
Creates dynamic connections, Uses a physical star topology
Which of the following is a field of the most common Ethernet frame type? (Choose all that apply.) Select one or more: a. FCS b. MAC type c. Destination MAC Address d. Data e. ARP trailer
FCS, Destination MAC Address, Data
Which protocol uses TCP port 21 be default?
FTP
T/F: A collision can occur on a switch only if the switch is operating in full-duplex mode.
False
T/F: An IP address is composed of 48 bits that are grouped together into 8-bit octets and are represented by a decimal number from 0 to 255.
False
T/F: DNS is a protocol that automatically provides a computer with its IP address configuration.
False
T/F: IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
False
T/F: The first packet in the four-packet exchange between a DHCP client and server is the DHCPRequest.
False
T/F: The physical bus topology is no longer used because it required extra cable to connect all the computers and required a central device.
False
T/F: When a NIC is in "promiscuous" mode, it will process only the frames in which the destination MAC address matches its own MAC address.
False
T/F: You cannot connect a hub to another hub unless it has an uplink port.
False
Which of the following is an advantage of a star topology? (Choose all that apply.) Select one or more: a. Allows faster technologies than a bus does b. Centralized monitoring of network traffic c. No single point of failure d. Requires less cabling than a bus
Allows faster technologies than a bus does, Centralized monitoring of network traffic
Which of the following components provides a number of critical services, including a user interface, memory management, multitasking, and the interface to hardware devices? Select one: a. Operating system (OS) b. RAM c. BIOS d. Hard drive
BIOS
Which of the following describes how devices connected to a hub use the speed at which the hub can transmit data? Select one: a. Bandwidth multiplier b. Bandwidth optimization c. Bandwidth dedication d. Bandwidth sharing
Bandwidth sharing
What type of packets are transmitted between DHCP client and server when a client is initially leasing an IP address?
Broadcast
To which device is a wireless access point most similar in how it operates? Select one: a. Router b. Hub c. Switch d. NIC
Hub
Which structured cabling component provides connectivity to computer equipment in the nearby work area?
IDF
a telecommunications closet that houses the cabling and devices for work area computers
IDF
protocol in which only e-mail headers are downloaded to the host until the message is opened
IMAPv4
Which of the following protocols provides connectionless service? (Choose 2.) a. TCP b. HTTP c. UDP d. IP
IP, UDP
an extension to IP working at the Internetwork layer that provides security by using authentication and encryption
IPsec
_______ addresses are 128 bits, so the number of possible addresses can be expressed as 34 followed by 37 0s.
IPv6
A(n) ________________ measures the amount of light transmitted by a device on a fiber-optic cable and whether the amount of light on the cable's receiver meets the requirements for the device you're connecting.
OPM
Which of the following is a feature of 100BaseFX? (Choose all that apply.) Select one or more: a. Uses two strands of fiber b. The fastest of the Ethernet standards c. Best when only short cable runs are needed d. Often used as backbone cabling
Often used as backbone cabling, Uses two strands of fiber
The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point?
demarcation point
Which component manages the details of communicating with the NIC hardware to send and receive data to and from network media?
device driver
You currently have 15 switches with an average of 20 stations connected to each switch. The switches are connected to one another so that all 300 computers can communicate with each other in a single LAN. You have been detecting a high percentage of broadcast frames on this LAN. You think the number of broadcasts might be having an impact on network performance. What should you do? Select one: a. Connect the switches in groups of five, and connect each group of switches to a central hub. b. Upgrade the switches to a faster speed. c. Disable broadcast forwarding on the switches. d. Reorganize the network into smaller groups and connect each group to a router.
Reorganize the network into smaller groups and connect each group to a router.
With some types of wireless networks, before a computer can transmit data to the AP, it must first send a short ________________________message to let the AP know it intends to transmit data.
Request to Send (RTS)
If you want a computer to be assigned the same IP address each time an address is assigned, what DHCP option should you configure?
Reservation
What element of a DHCP server uses the client MAC address to ensure that the client is leased the same address each time it requests an IP address?
Reservation
What's another name for a DNS client?
Resolver
Where does a DNS server look when it can't resolve a query from its zone records or cache?
Root hints
Which of the following accurately describes the .edu in the FQDN www.yc.edu?
Top-level domain
If you want to design an Application-layer protocol that provides fast, efficient communication and doesn't work with large amounts of data, what Transport-layer protocol would you design it to use?
UDP
Transport layer protocol that is connectionless
UDP
Which transport protocol does DHCP use?
UDP
Which of the following is a Transport layer protocol? (Choose 2.) a. ICMP b. ARP c. DHCP d. UDP e. IP f. TCP
UDP, TCP
You're the network administrator for a company located in Arizona that has just opened an office in Texas. You need to make sure that the two locations can communicate. What type of network are you implementing?
WAN
You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC?
device driver
a method for transmitting data in which two wires of opposite polarity are used
differential signal
what characteristic of twisted pair cabling helps mitigate the effects of crosstalk?
differential signals
What is a disadvantage of using fiber-optic cabling?
difficult to install
(Ch 4 Rev) Which of the following wireless technologies does an 802.11 wireless network using the 2.4 GHz frequency range use?
direct-sequence spread spectrum
You have installed Windows Server 2012 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server?
directory services
is a collection of users and computers whose accounts are managed by Windows servers called domain controllers.
domain
is a packet that has been encapsulated with the source and destination MAC addresses in the header and an error-checking code in the trailer.
frame
What feature of a switch allows devices to effectively communicate at 200 Mbps on a 100 Mbps switch? Select one: a. Uplink port b. Full-duplex mode c. Shared bandwidth d. Frame doubling e. Bit strengthening f. Signal regeneration
full duplex
A switch operating in ___________ mode can send and receive data at the same time.
full-duplex
communication in which a device can send and receive signals but not at the same time
half-duplex mode
which of the following is a characteristic of unshielded twisted-pair cable? (choose 2)
has a distance limitation of 100 meters, is susceptible to electrical interference
The frequency at which a wireless network operates is measured in cycles per second and is expressed as what unit of measurement?
hertz
runs from work area's jack to telecommunications closet
horizontal wiring
Which of the following are components of a network that are defined by structured cabling? (Choose Three)
horizontal wiring, entrance facility, work area
What are you likely to find in a DNS zone?
hostname-IP address pairs
A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?
hub
device that connects multiple computers but regenerates signals out all ports
hub
Which of the following is the purpose of an SSID? Select one: a. Assigns an address to a wireless NIC b. Acts as a unique name for a local area connection c. Identifies a wireless network d. Acts as a security key for securing a network
identifies a wireless network
Peer-to-peer networks aren't suitable in which of the following situations? Select one: a. Five or fewer users need network access. b. Tight security is required c. Budget is the primary consideration. d. No one uses the network heavily.
tight security is required
Which of the following is NOT a field in an Ethernet frame?
time-to-live
which of the following technologies are used in wireless LANs use for transmitting and receiving data?
narrowband radio, spread-spectrum radio
What command would you issue from the command prompt to test whether your computer has connectivity to the network?
ping IPaddress
the space between a false ceiling and the true ceiling where heating and cooling air circulates is called the __________.
plenum
direct connection between two devices
point-to-point topology
Which of the following is used by TCP and UDP to specify the source and destination Application-layer protocols?
port numbers
Which statements are correct about the gatekeeper?
to block network traffic not intended for a specific computer, Its on the NIC
when might you want to use a rollover cable?
to configure a Cisco device
Which media access method is used by FDDI?
token passing
A device used to trace or locate cables.
tone generator
What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer?
tracert
which command displays the route packets take between two computers?
tracert
what is the name of the device that is used to translate between wired and wireless networks (choose2)
transceiver, access point
Which of the following is NOT a function of a hub?
transmits the signal to the correct port
(Ch 4 Test) t/f: Wireless and wired networks are both susceptible to RFI.
true
(t/f) In order to find out your MAC address, you should open a command prompt and type ipconfig /all.
true
(t/f) What makes a computer a "server" is the fact that it has a server operating system installed on it.
true
(t/f)A network that has locations in different countries is considered a WAN.
true
True or False: All hosts on the same network must share the same network ID.
true
True or False: In a physical star topology, a failure in the central device causes the entire network to go down.
true
t/f: CSMA/CD is the name of the media access method used by Ethernet
true
t/f: There are two basic categories of physical cabling used in Ethernet networks. They are copper wire and fiber optic.
true
t/f: Because fiber-optic cabling uses light pulses instead of electrical signals, it is immune to interference and highly resistant to eavesdropping.
true
t/f: Most office buildings usually have a false ceiling with an area above that which is used to run conduit for heating and air conditioning units, called the plenum.
true
t/f: Token Passing is used by FDDI
true
t/f: When copper wires are bundled together, they are susceptible to crosstalk a form of interference where the signals leak out onto other wires.
true
t/f: Wireless networks are often used to extend the reach of a wired LAN.
true
t/f: fiber-optic cable is immune to electromagnetic interference? (EMI)
true
What is a frame called that is intended for only one individual computer?
unicast
What is a packet called that is intended for only one individual computer?
unicast
Question text You're configuring a WLAN in a long narrow ballroom. The only place you can put the AP is at the far end of the room. Which type of antenna should you use?
unidirectional
When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?
switch
device that uses MAC addresses to determine the destination of frame
switch
Which of the following connections might require a crossover cable?
switch to switch
What is the most common topology and technology combination in use today?
switched/Ethernet
which IPv6 transition technology can be used with NAT routers and has the address prefix 2001::/32?
teredo
Which of the following is not one of the main differences between the types of network cabling?
the ability to send and receive signals
What does a switch store in its switching table?
the source MAC address of a frame and the port it was received on
When discussing Ethernet standards, what does the XBaseY terminology refer to?
the transmission speed, the type of transmissions, and the length or type of cabling
what happens to signals as they travel the length of the medium?
they attenuate.
TCP establishes a connection with the destination device using which process?
three-way handshake
With a _________ antenna, signals are focused in a single direction, which makes them ideal for placement at one end of long, narrow spaces or to cover distances between buildings.
unidirectional
Review the routing table in Figure 2-25. Based on this figure, where does the router send a packet with the source network number 1.0 and the destination network number 3.0? Select one: a. None of the above b. WAN A c. WAN B d. EthA
wan B
What does TCP use to provide flow control?
window size
(Ch 4 Quiz) which device can be used to connect networks up to three miles?
wireless bridge
Which technology is likely to be implemented as a point-to-point physical topology?
wireless bridge
On a Windows based peer to peer network, all computers are members of a:
workgroup
There are two different network models. One of them, a peer-to-peer network, also is referred to as a
workgroup
(Ch 6 Test)
wow we havent taken it yet
Using the physical mail analogy, what part of an address on an envelope is most like the IP address?
zip code
in a Class C network 192.168.1.0 how many subnets are available with a subnet mask of 255.255.255.0?
1
In an MDI device, on which two pins does the device use to transmit?
1,2
which IP address expressed in CIDR notation has the subnet mask 255.255.255.0?
10.100.44.123/24
(Ch 3 Quiz) Question text When using UTP cabling, what is the maximum cable segment allowed from the computer to a hub or switch?
100 Meters
When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?
100 meters
What is the maximum bandwidth for a network cabled using category 5e UTP cable?
1000Mbps
What is the maximum cable length for both category 5e and category 6 UTP cable?
100m
convert this IP address into Binary: 172.16.1.55
10101100.00010000.00000001.00110111
Which 10 Gigabit standard uses MMF cabling for distances up to 300 meters and is often used for SONET campus networks?
10GBaseSW
what is the standard that describes 10 Gigabit running over four pairs of CAT6A cabling?
10GBaseT
How many channels can be used on an 802.11b network in North America?
11
Which of the following is a common operational speed of a wireless network? Select one: a. 600 Kbps b. 11 Mbps c. 110 Gbps d. 10 Kbps
11 mbps
A device used to terminate twisted pair cables in a patch panel
110 punchdown tool
convert this IP address into Binary: 192.168.100.223
11000000.10101000.01100100.11011111
convert this IP address into Binary: 207.42.64.29
11001111.00101010.01000000.00011101
convert this IP address into Binary: 225.240.235.210
11100001.11110000.11101011.11010010
With access points signals don't travel through a physical medium; they travel through the airwaves as radio signals.
12 hexadecimal characters
Which of the following IP addresses has 12 bits in the host ID?
12.156.109.252/20
(Ch 5) How many bits are in an IPv6 address?
128
An IPv6 address is made up of how many bits?
128
how many bits are in an IPv6 address?
128
You just joined a new company and the network administrator has assigned you your own subnet you will be the administrator of. The network is a Class A network 10.0.0.0 and uses a subnet mask of: 255.240.0.0 How many subnets are available on this network.
16
which IP network address expressed in CIDR notation can support a maximum of 1022 hosts?
172.16.4.0/22
which address can't be assigned to a host computer?
172.16.7.255/22
which of the following is a private IP address and can't be routed across the Internet?
172.19.243.254
convert this IP address into Binary: 10.10.10.254
00001010.00001010.00001010.11111110
(Ch 6 Subnetting) Convert this IP address into Binary: 15.19.193.217
00001111.00010011.11000001.11011001
convert this IP address into Binary: 65.45.200.100
01000001.00101101.11001000.01100100
convert this IP address into Binary: 68.220.237.173
01000100.11011100.11101101.10101101
convert this IP address into Binary: 78.15.77.130
01001110.00001111.01001101.10000010
convert this IP address into Binary: 105.178.40.32
01101001.10110010.00101000.00100000
You are a network consultant and a business is asking you to quote the cost of creating a WAN for them. They currently have two offices which are not connected and they are adding 1 more so they need to have all 3 office connected. They heard that a physical mesh is the best topology for redundancy but they are afraid of the costs so they have asked you to come up with two options. You suggest a physical star or the physical mesh. What is the setup cost difference for their WAN between the star and mesh? The router they will need has 3 WAN ports and costs $2000 Each Connection will cost them $5000 For the star network they will use their current headquarters as the central connecting locations so there isn't a need to purchase a 4th router.
$5000
in a Class C network 192.168.1.0 how many hosts are available with a subnet mask of 255.255.255.254?
0
Judy has just sent a ping message from her computer to John's computer using John's computer's IP address to verify that she has connectivity. List the steps that the message takes to get to the other computer and what layer of the network communication process each step relates to. 1st, Judy opens a command prompt and types the command "ping 192.168.0.10". Answer 1 2nd, Judy's computer to create the ping message to send to John's computer. Answer 2 3rd A, The ping message then is encapsulated with the IP addresses of both Judy's computer and John's, which are the source and destination IP addresses. Answer 3 3rd B, Judy's computer also finds out what the MAC address of John's computer is, which will be the destination MAC address. Answer 4 Finally, Judy's computer adds her MAC address and John's MAC address (source and destination MAC addresses) to the package, converts the message into bits, and sends it to the network medium.
1st, Judy opens a command prompt and types the command "ping 192.168.0.10". → application layer 2nd, Judy's computer to create the ping message to send to John's computer. → network software layer 3rd A, The ping message then is encapsulated with the IP addresses of both Judy's computer and John's, which are the source and destination IP addresses. → network protocol layer 3rd B, Judy's computer also finds out what the MAC address of John's computer is, which will be the destination MAC address. → network protocol layer Finally, Judy's computer adds her MAC address and John's MAC address (source and destination MAC addresses) to the package, converts the message into bits, and sends it to the network medium. → network interface step
how many strands of fiber-optic cable are needed for a network connection?
2
A signal has just been received from the WAN link on your network. Using the given components, which of the following shows the path that the signal would take from the WAN to a workstation on your network? Assume all components are used at least once and that some components may be used more than once. 1—backbone cabling 2—entrance facility 3—equipment room 4—horizontal wiring 5—telecommunications closet 6—work area
2, 1, 3, 1, 5, 4, 6
which of the following represents a valid IPv6 address?
2001:345:abcd::BEEF:44
in a Class C network 192.168.1.0 how many hosts are available with a subnet mask of 255.255.255.0?
254
you have a Class B network 172.16.0.0 that needs to be setup in a way that there are at least two networks and at least 300 computers per network. What subnet mask should you use?
255.255.128.0
Horizontal wiring from the wall jack to the patch panel should be no longer than how many meters?
90 meters
currently you have a class B network 172.16.0.0 Currently you have been having problems with security and network performance. A consultant suggests splitting the network into 32 separate networks to help with security and bandwidth. What subnet mask should you use that will give you the most number of computer stations per subnet but still give you at least 32 subnets? (Answer should look simular to this: 255.255.255.255)
255.255.248.0
what subnet mask does the following network in CIDR notation have? 192.168.2.0/27
255.255.255.224
you have a Class C network with an address 192.168.55.0, what subnet mask will allow you to have 16 subnets? Answer with the full subnet mask (all 4 octets)
255.255.255.240
for the Class C network address 192.168.10.0, what subnet mask provides 32 subnets?
255.255.255.248
you just joined a new company and the network administrator has assigned you a subnet you will be the administrator of. The network is a Class C network 192.168.15.0 and uses a subnet mask of: 255.255.255.224 How many hosts are available on these networks.
30
In a Class C network 192.168.1.0 how many subnets are available with a subnet mask of 255.255.255.248?
32
how many bits must be reallocated from host ID to network ID to create 16 subnets?
4
Which of the following is NOT a component of an Ethernet frame header?
4-byte frame check sequence
At what speed did token ring originally operate?
4Mbps
At what speed did token ring originally operate?
4mbps
What port number is associated with the DNS server service?
53
what address should you ping if you want to test local IPv6 operation but don't want to actually send any packets on the network?
::1
How many host bits are necessary to assign addresses to 62 hosts?
6
how many links (cables) would you need in a full mesh configuration if you had 4 nodes?
6
in a Class C network 192.168.0.0 how many hosts are available with a subnet mask of 255.255.255.192?
62
How many bits are in the interface ID of an IPv6 address?
64
which of the following tunneling protocols requires that the IPv4 address embedded in the tunneling address must be a public address?
6to4
What is the IEEE standard governing wireless networking?
802.11
What is the networking standard for wireless networking
802.11
What is the networking standard for wireless networking (also known as Wireless Fidelity or Wi-Fi)?
802.11
Which Wi-Fi standard can provide the highest bandwidth?
802.11ac
Which Wi-Fi standard uses beamforming to allow an AP to send data to multiple devices simultaneously?
802.11ac
What is the difference between a client and a server, in networking terms? Select one: a. A client can be a workstation that requests network resources from a server. A server provides a network service to client computers. b. A server can be a workstation that requests network resources from a client. A client provides a network service to client computers.
A client can be a workstation that requests network resources from a server. A server provides a network service to client computers.
Which of the following best describes a client? Select one: a. A computer's primary role in the network is to run user applications and access network resources. b. A computer's primary role in the network is to give other computers access to network resources and services. c. The OS installed on a computer is designed mainly to share network resources. d. It's the software that responds to requests for network resources.
A computer's primary role in the network is to run user applications and access network resources.
Which of the following is true of a MAC address?
A destination address of 12 hexadecimal Fs is a broadcast.
Match the description with the type of network? A network where all computers are hierarchically equal to one another. Answer 1 Networks may extend beyond the boundaries of a building but with in the same geographical location. Answer 2 A network that connects two or more different geographically locations. Answer 3 A network with a central computer that controls communication and resource sharing. Answer 4 A network of computers and other devices that is confined to a relatively small space, such as one building or even one office.
A network where all computers are hierarchically equal to one another. → peer-to-peer, Networks may extend beyond the boundaries of a building but with in the same geographical location. → MAN (metropolitan area network), A network that connects two or more different geographically locations. → WAN (wide area network), A network with a central computer that controls communication and resource sharing. → client/server network, A network of computers and other devices that is confined to a relatively small space, such as one building or even one office. → LAN (local area network)
List the five steps in order that a switch performs for each frame. The switch looks up the destination MAC address in its switching table. Answer 1 The switching table is updated with the source MAC address and port information. Answer 2 The switch receives a frame. Answer 3 The switch reads the source and destination MAC addresses. Answer 4 The switch forwards the frame to the port where the computer owning the MAC address is found. Answer 5
A switch's operation can be summarized in these steps: 1. The switch receives a frame. 2. The switch reads the source and destination MAC addresses. 3. The switch looks up the destination MAC address in its switching table. 4. The switch forwards the frame to the port where the computer owning the MAC address is found. 5. The switching table is updated with the source MAC address and port information.
When a Windows computer is configured to use DHCP but no DHCP server is available, what type of address is configured automatically for it?
APIPA
type of address that is automatically assigned when no DHCP server can be contacted
APIPA
when a Windows computer is configured to use DHCP but no DHCP server is available, what type of address is configured automatically for it?
APIPA
(Ch 5 Rev Q) Which of the following protocols resolves logical addresses to physical addresses?
ARP
Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?
ARP
What protocol is used to resolve a logical IP address to a physical MAC address?
ARP
Which protocol is responsible for determining the MAC address associated with each IP address and keeping a table of its results?
ARP
_______ is used to resolve a logical (IP) address to a physical (MAC) address.
ARP
resolves IP address to MAC address
ARP
Match these network types with their description. An internetwork that is confined to a geographic region such as a city or county; uses third-party communication providers to provide connectivity between locations. Answer 1 A small network, limited to a single collection of machines and linked by interconnecting devices in a small geographic area. Answer 2 A private network in which devices and servers are available only to uses connected to the internal network. Answer 3 A networked collection of LANs tied together by devices such as routers. Answer 4 Internetworks that are geographically dispersed and use third-party communication providers to provide connectivity between locations. Answer 5 A worldwide public internetwork that uses standard protocols, such as TCP/IP, DNS, and HTTP, to transfer and view information.
An internetwork that is confined to a geographic region such as a city or county; uses third-party communication providers to provide connectivity between locations. → MAN, A small network, limited to a single collection of machines and linked by interconnecting devices in a small geographic area. → LAN, A private network in which devices and servers are available only to uses connected to the internal network. → intranet, A networked collection of LANs tied together by devices such as routers. → internetwork, Internetworks that are geographically dispersed and use third-party communication providers to provide connectivity between locations. → WAN, A worldwide public internetwork that uses standard protocols, such as TCP/IP, DNS, and HTTP, to transfer and view information. → Internet
which category of UTP is the recommended cabling standard for 1 gbps over copper media?
CAT6
What type of resource record is an alias for another record?
CNAME
The __________ executes instructions provided by computer programs.
CPU
Which component, located on the motherboard, carries out all the instructions provided by computer programs?
CPU
In wireless networks, what type of media access control is used?
CSMA/CA
Which access method does Wi-Fi use?
CSMA/CA
access method used by Wi-Fi
CSMA/CA
What is the media access method used by Ethernet?
CSMA/CD
Which access method uses a "listen before sending" strategy?
CSMA/CD
devices on the network must listen first before they can transmit
CSMA/CD
Which of the following is a characteristic of fiber-optic cabling? (Choose all that apply.) Select one or more: a. Requires only a single strand of fiber for network connections b. Lower bandwidth capability c. Carries data over longer distances than UTP d. Can be used in electrically noisy environments
Can be used in electrically noisy environments, Carries data over longer distances than UTP
what is the name of the media access method used by Ethernet?
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Which of the following categories of UTP cabling are considered to be data grade as specified by ANSI/TIA/EIA? (Choose Three.)
Cat 4,5,6
which of the five IP Address class ranges are available for host assignment? (choose 3)
Classes A,B,C
Windows 7 and Windows 10 are examples of which of the following?
Client operating system
A network with a central computer that controls communication and resource sharing.
Client/Server network
Which of the following is true about full-duplex Ethernet? (Choose all that apply.) Select one or more: a. Collision detection is turned off. b. It's possible only with switches. c. Stations can transmit and receive but not at the same time. d. It allows a physical bus to operate much faster.
Collision detection is turned off., It's possible only with switches.
Which of the following describe the function of routers? (Choose all that apply.) Select one or more: a. Forward frames from one network to another b. Attach computers to the internetwork c. Work with packets and IP addresses d. Connect LANS
Connect LANS, Work with packets and IP addresses
Which protocol can configure a computer's IP address and subnet mask automatically?
DHCP
dynamically configures IP address
DHCP
What is the correct order of DHCP packets when a computer requests its IP address configuration?
DHCP Discover, Offer, Request Ack
Which of the following is the first packet sent when a computer wants to lease an IP address?
DHCPDiscover
TCP/IP uses _________ to look up a computer's IP address, given its name.
DNS
resolves computer names to IP addresses
DNS
Which of the following Application-layer protocols typically uses the UDP Transport-layer protocol? (Choose all that apply.) a. DHCP b. Root hints c. DNS d. HTTP
DNS, DHCP
Which of the following is a function of the Application layer?
Data formatting and translation
Which of the following characteristics is associated with a peer-to-peer network? (Choose all that apply.) Select one or more: a. Centralized control b. Inexpensive c. Uses a directory service d. Decentralized data storage e. User-managed resources
Decentralized data storage, Inexpensive, User-managed resources
the subnet mask of an IP address does which of the following?
Defines network and host portions of an IP address
text Which of the following is a function of the Internetwork layer?
Deliver packets efficiently
What is the name given to software that provides the interface between the OS and computer hardware?
Device driver
Why is the use of a switch preferred over a hub?
Devices on a hub have to share the available bandwidth. Switches are intelligent; they read the frame and determine where to send it. Switches can operate in full-duplex mode.
If a router receives a packet with a destination network address unknown to the router, what does the router do?
Discard the packet.
which of the following is UTP susceptible to? (choose 2)
EMI, crosstalk
Ping uses ICMP ___________ packets to request a response from another computer to verify whether it's available for communication.
Echo
What is the Ethernet frame type that is used by TCP/IP?
Ethernet II
Which is the correct order of headers, from left to right, in a completed frame?
Frame, IP, UDP
. A multi-port repeater is often referred to as a _________________. Select one: a. Switch b. Hub c. Bridge d. Network Interface Card
HUB
Which of the following is a characteristic of unshielded twisted-pair cabling? (Choose all that apply.) Select one or more: a. Commonly used in physical bus topologies b. Susceptible to electrical interference c. Has a distance limitation of 100 meters d. Consists of four wires
Has a distance limitation of 100 meters, Susceptible to electrical interference
Put the definitions of input output processing in order that they happen within a computer. Information is sent to whatever device is appropriate to perform or display the output. Output devices include, but are not limited to, monitors, printers, and storage devices. Answer 1 The CPU processes information, which means that it examines the information and determines or calculates the results. Answer 2 Input can come from several different devices like a mouse, a keyboard, or storage. Input usually is generated by a user's actions, but not always. Answer 3
Information is sent to whatever device is appropriate to perform or display the output. Output devices include, but are not limited to, monitors, printers, and storage devices. → Step 3, The CPU processes information, which means that it examines the information and determines or calculates the results. → Step 2, Input can come from several different devices like a mouse, a keyboard, or storage. Input usually is generated by a user's actions, but not always. → Step 1
At what layer of the TCP/IP protocol suite are IP addresses defined and verified?
Internetwork
If a protocol is routable, which TCP/IP layer does it operate at?
Internetwork
In which layer does a router operate?
Internetwork
(Ch 2 Review) What's the purpose of an RTS signal in wireless networking?
It allows a client to notify the AP that it's ready to send data.
How does a protocol analyzer capture all frames? Select one: a. It sets the exclusive mode option on the NIC. b. It sets all incoming destination addresses to be broadcasts. c. It captures only multicast frames. d. It configures the NIC to operate in promiscuous mode. e. It configures the NIC to capture only unicast frames.
It configures the NIC to operate in promiscuous mode.
What does a switch do if it doesn't find the destination MAC address in its switching table?
It forwards the frame to all ports
Which of these statements describe a broadcast frame? (Choose 4) a. It is a MAC address with all binary 1s b. in hexadecimal notation reads as FF-FF-FF-FF-FF-FF c. They are intended for all devices on a network d. They are blocked by routers e. They are blocked by switches
It is a MAC address with all binary 1s, in hexadecimal notation reads as FF-FF-FF-FF-FF-FF, They are intended for all devices on a network, They are blocked by routers
What does it usually mean when the activity light on a switch is blinking?
It is communicating with the network
What is the main disadvantage of cable modem networking?
It uses a bus topology.
A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?
It's the organizationally unique identifier for the manufacturer of the device.
What is the purpose of the default route?
It's where the router sends all packets with destinations of which it has no knowledge.
A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?
LAN
A network of computers and other devices that is confined to a relatively small space, such as one building or even one office.
LAN
A/an ____ is recommended if the network use and security factors don't require using a router.
LAN
which of the following IPv6 features is an enhancement to IPv4? (Choose 2)
Larger address space, Built-in Security
Which of the following IPv6 features is an enhancement to IPv4? (Choose 2.) a. It is a cooler version b. Works at the Internetwork and Transport layers c. Larger address space d. Built-in security e. Connectionless communication
Larger address space, Built-in security
Which of the following is a likely indicator light on a hub? (Choose all that apply.) Select one or more: a. Connection speed b. Activity c. Signal strength d. CRC error e. Link status
Link status, Connection speed, Activity
which IPv6 address type can't be routed and are equivalent to Automatic Private IP Addressing (APIPA) in IPv4?
Link-local address
What does LAN stand for
Local Area Network
The _________ address is composed of two 24-bit numbers.
MAC
What is the name of the address that is part of a NIC?
MAC
(Ch.1 test) Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value. What is this address called?
MAC address
Every NIC has a unique address that consists of a 12-digit hexadecimal value. What is this address called?
MAC address
Which of these statements are true about a MAC address? (Choose 3) a. MAC address is a number that is burned into the memory of each NIC b. It is a unique number assigned by the manufacturer c. the last 24 bits are a serial number assigned by the manufacturer d. It is 48 bits and is usually expressed in six two-digit hexadecimal numbers e. The first 24 bits are an ID number for the manufacturer, called the OUI
MAC address is a number that is burned into the memory of each NIC, It is a unique number assigned by the manufacturer, It is 48 bits and is usually expressed in six two-digit hexadecimal numbers, The first 24 bits are an ID number for the manufacturer, called the OUI, the last 24 bits are a serial number assigned by the manufacturer
In network communication, the ______________ address is used to deliver a frame to the correct computer on the network. (Choose all that apply.) a. IP b. Logical c. MAC d. Physical
MAC, Physical
Networks may extend beyond the boundaries of a building but with in the same geographical location.
MAN
The XYZ company has two offices, one downtown, and a brand new office in the newer section of town. To connect the two offices, they will need a dedicated line, probably leased from the local phone company. What type of network will they be implementing to connect their two offices?
MAN
use WAN technologies to interconnect LAN's in a specific geographic region.
MAN's
an equipment and cabling room that serves as the connecting point for backbone cabling between buildings and between IDFs
MDF
where are you most likely to find backbone cabling? (choose 2)
MDF, between IDFs
which of the following types of fiber-optic connectors provides high density and requires only one connector for two cables?
MT-RJ
What type of record do you need to create so the address of your mail server can be resolved?
MX
(CH. 1 quiz) What is the physical address assigned to NICs called?
Media Access Control
which fiber optic media type uses light-emitting diodes (LEDs) instead of lasers?
Multimode fiber (MMF)
which IP addressing process enables workstations to use private IP addresses to access the Internet?
NAT
What component of the computer provides it with a MAC address?
NIC
Choose the correct order for the process of a user attempting to access network resources: NIC driver Answer 1 Network protocol Answer 2 Network client Answer 3 Application
NIC driver → 4, Network protocol → 3, Network client → 2, Application → 1
In what layer does the NIC operate?
Network Access
In which layer does Ethernet operate?
Network Access
(Ch 6 Rev Q) When using TCP/IP, which of the following must computers on the same logical network have in common? (Choose 2)
Network ID, Subnet Mask
NIC stands for
Network Interface Card
What information is found in a routing table? Select one: a. Computer names and IP addresses b. Network addresses and interfaces c. MAC addresses and ports d. IP addresses and MAC addresses
Network addresses and interfaces
Which of the following requests information stored on another computer? Select one: a. Device driver b. NIC c. Network server d. Network protocol e. Network client
Network client
Which of the following is a reason to subnet? (Choose 2)
Networks can be divided into logical groups., Subnetting can decrease the size of broadcast domains.
What is the best way to eliminate the possibility of collisions in a network?
Only use switches, Use NICs that operate in full-duplex mode.
which type of connection is most likely to require a crossover cable?
PC to router
You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboard. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?
PCI-express
You want to purchase a high-performance graphics card for your computer. Which type of connector should it have?
PCI-express
Which topology is likely to be deployed in a WAN where there's a central office and three branch offices, and you want all traffic from the branch offices to go through the central office network? Select one: a. Point-to-point b. Mesh c. Ring d. PMP
PMP
protocol in which e-mail is downloaded to the host computer
POP3
In a/an ____, every user must also act as a network administrator, controlling access to the resources on their machines.
Peer to Peer
A network where all computers are hierarchically equal to one another.
Peer to peer
You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?
Peer to peer
You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible What type of network should you install?
Peer to peer
Which of the following is a task usually performed by the BIOS? (Choose all that apply.) Select one or more: a. Store the operating system. b. procedure c. Create an interrupt. d. Perform a POST.
Perform a POST., procedure
Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?
Physical ring
(Ch 3 test ) In which topology does a central device communicate with two or more other devices and is used in WANs where a main office has connections to several branch offices via a router?
Point-to-multipoint
What does the Transport layer use to identify source and destination Application-layer protocols?
Port number
Place the following steps of the boot procedure in order. Power is applied Answer 1 The OS is loaded into RAM Answer 2 Boot devices are searched Answer 3 OS services are started Answer 4 The POST is executed Answer 5 CPU starts
Power is applied → 1, The OS is loaded into RAM → 5, Boot devices are searched → 4, OS services are started → 6, The POST is executed → 3, CPU starts → 2
Which of the following is a basic function a computer performs? (Choose all that apply.) Select one or more: a. Graphics b. E-mail c. Internet access d. Output e. Processing f. Input
Processing, Input, Output
Name the three basic tasks all computer perform: Select one or more: a. Input b. Processing c. Hacking d. Output e. Email
Processing, Output, Input
Which of the following is a task performed by a NIC and its driver? (Choose all that apply.) Select one or more: a. Receives packets from the network protocol and creates frames b. Adds a header before sending a frame to the network protocol c. Converts bit signals into frames for transmission on the medium d. Adds error-checking data to the frame e. Provides a connection to the network medium
Provides a connection to the network medium, Receives packets from the network protocol and creates frames, Adds error-checking data to the frame
Which Application-layer protocol provides remote access to a Windows computer via a GUI?
RDP
Which protocol is used to access a Windows computer remotely using the Windows graphical user interface?
RDP
what type of connector is used most commonly with TP network wiring?
RJ-45
Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP?
RTS
Which of the following is true of a repeater? Select one: a. Receives bit signals and strengthens them b. Receives frames and forwards them c. Determines which network to send a packet d. Has a burned-in MAC address for each port
Receives bit signals and strengthens them
Identify which properties is performed by a traditional router or switch works with packets rather Answer 1 works with logical (IP) Answer 2 doesn't forward broadcast traffic Answer 3 connect LANs with different subnet Answer 4 works with frames Answer 5 keeps information about the networks it knows about and which interface that network can be reached from Answer 6 It's tablet contains MAC address and port information. Answer 7 works with physical (MAC) Answer 8
Routers don't forward broadcast packets, but switches do. Routers use routing tables, and switches use switching tables. The correct answer is: works with packets rather → Routers, works with logical (IP) → Routers, doesn't forward broadcast traffic → Routers, connect LANs with different subnet → Routers, works with frames → switches, keeps information about the networks it knows about and which interface that network can be reached from → Routers, It's tablet contains MAC address and port information. → switches, works with physical (MAC) → switches
Which Application layer protocol is used for file-sharing? (Choose 2.) a. SMB b. HTTP c. DNS d. SMTP e. NFS
SMB, NFS
which statement is true about fiber-optic cables?
SMF uses lasers and has a thinner core
Which Application-layer protocol is used to monitor and manage network devices, and what Transport-layer protocol does it use?
SNMP, UDP
What information must you have in order to connect to a wireless network? Select one: a. SSID b. MAC address of the switch c. Al Gore d. MAC address of the router e. Name of the switch
SSID
What is the first segment in the three-way handshake?
SYN
Which of the following is considered a property of Ethernet? (Choose all that apply.) Select one or more: a. Scalable b. Obsolete technology c. Guaranteed delivery system d. Best-effort delivery system
Scalable, Best-effort delivery system
which of the following protocols is used by Windows file and printer services to share resources between Windows computers?
Server Message Block
What purpose does the timestamp serve in a switching table
Tells the switch when to delete an entry
What does a switch use to create its switching table?
Source MAC adress
Which of the following is NOT a reason to prefer a switch over a hub?
Switches can operate at 10 Mbps or 100 Mbps.
Transport layer protocol that is connection-oriented and reliable
TCP
Which of the following is not an Application layer protocol?
TCP
Which protocol is connection-oriented?
TCP
Which tool measures cable length by transmitting a signal on one end and measuring the time it takes for the reflection to reach the end of the cable?
TDR
which of the following is a wiring standard for twisted-pair cable connections? (choose 2)
TIA/EIA 568A, TIA/EIA 568B
What field of the IP header does the tracert program use to get the IP address of routers in the path?
TTL
What is a default gateway? (Choose 2) a. The Gatekeeper portion of a NIC b. The IP address packets are sent when the destination network is unknown c. The IP address used to do name to IP address lookups d. A router e. A Switch
The correct answers are: A router, The IP address packets are sent when the destination network is unknown
Under which circumstances does a NIC allow inbound communications to pass through the interface? (Choose all that apply.) Select one or more: a. The destination MAC address is all binary 1s. b. The source MAC address is the broadcast address. c. The destination MAC address matches the built-in MAC address. d. The NIC is operating in exclusive mode.
The destination MAC address matches the built-in MAC address., The destination MAC address is all binary 1s.
How does a switch "learn" MAC addresses?
The switch reads each frame and makes a note of where each MAC address came from.
Which of the following is true about collisions?
They can occur on Ethernet half-duplex networks
Which of the following is the term for identifying packets used by TCP to establish a connection?
Three-Way Handshake
Which of the following is not found in a connectionless Transport-layer protocol? (Choose 2.) a. Checksum b. Three-Way Handshake c. Acknowledgements d. Port numbers
Three-Way Handshake, Acknowledgements
Which of the following is a limitation of early networks that used a daisy-chain method of connecting computers? (Choose all that apply.) Select one or more: a. Total number of computers that could be connected b. The processing speed of the computers connected c. Cable length d. No Internet access
Total number of computers that could be connected, Cable length
Which of the following is true of a hub? (Choose all that apply.) Select one or more: a. Works with MAC addresses b. Usually has four or more ports c. Usually has just two ports d. Transmits regenerated signals to all connected ports
Transmits regenerated signals to all connected ports, Usually has four or more ports
The four layers of the TCP/IP protocol suite are Application, __________, Internetwork, and Network Access.
Transport
Which TCP/IP model layer takes a large chunk of data from the Application layer and breaks it into smaller segments?
Transport
T/F: If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.
True
T/F: A network's logical topology often depends on the central device's electronics.
True
T/F: A network's physical topology refers to the arrangement of the cabling and how the devices connect to each other.
True
T/F: A point-to-point topology is typically used for WAN connections.
True
T/F: Routers do not forward broadcast packets.
True
T/F: The Internetwork layer includes ICMP and ARP, among other protocols within the TCP/IP suite.
True
T/F: The Internetwork layer is the layer that handles network configuration and is considered the heart of the TCP/IP protocol suite.
True
T/F: The Transport layer uses port numbers to identify the source and destination Application-layer protocol of the data that it contains.
True
T/F: The function of a repeater is to extend the range of an existing network.
True
How do you enter BIOS?
Turn on your computer and immediately press the button corresponding to BIOS
Which of the following best describes a MAC address? Select one: a. A 24-bit number expressed as 12 decimal digits b. A dotted decimal number burned into the NIC c. A 48-bit number composed of 12 octal digits d. Two 24-bit numbers, in which one is the OUI
Two 24-bit numbers, in which one is the OUI
A network that connects two or more different geographically locations.
WAN
Which of the following is considered long-term storage? (Choose all that apply.) Select one or more: a. USB or Flash Drive b. Working Storage c. RAM d. Hard Drive
USB or Flash Drive, Hard Drive
Which of the following is true about routers? (Choose all that apply.) Select one or more: a. Forward unicasts b. Use default routes for unknown network addresses c. Forward broadcasts d. Used primarily to connect workstations
Use default routes for unknown network addresses, Forward unicasts
You have a server with two NICs, each attached to a different IP network. You're having problems communicating with devices on remote networks that send packets to one of the interfaces. The server receives the packets fine, but the server's replies never reach the intended destination network. Replies to packets that come in through the other interface seem to reach their destination without any problems. What can you do that will most likely solve the problem?
Use the route command to add routes to the networks that aren't receiving replies.
Which of the following is true about infrastructure mode in wireless networks? (Choose all that apply.) Select one or more: a. Best used for temporary networks b. Resembles a physical bus and logical ring c. Uses a central device d. It is most like a logical bus and physical star
Uses a central device, It is most like a logical bus and physical star
Which of the following is a task performed by the Network access layer? (Choose 2). a. Defines and verifies IP addresses b. Delivers packets efficiently c. Verifies that incoming frames have the correct destination MAC address d. Resolves MAC addresses by using IP addresses e. Transmits and receives bit signals
Verifies that incoming frames have the correct destination MAC address, Transmits and receives bit signals
What is the main difference between a wireless access point and a hub? Select one: a. With access points signals are send only to the device they were designated for b. With hubs signals are send only to the device they were designated for c. With access points signals don't travel through a physical medium; they travel through the airwaves as radio signals. d. Hubs use the channel 802.11AC to send signals while Access Points use channels 802.11 (a,b,g,n) to send signals
With access points signals don't travel through a physical medium; they travel through the airwaves as radio signals.
Why would you need to use a repeater?
You need to add a group of computers to your network, and the distance is too far for normal means of communication.
Which of the following is not a function of the Network Access layer?
delivers packets efficiently
In a token ring network, what is the central device called?
multistation access unit
The SSID is configured on which of the following so that it can be distinguished from other available wireless networks?
access point
device that connects wireless computers
access point
When a wireless computer uses a peer-to-peer connection to directly connect to another wireless computer, it is operating in what mode?
ad hoc
Which Wi-Fi mode of operation is typically used in small or temporary installations, where data travels from one device to another in a line?
ad hoc mode
which Wi-Fi mode of operation is typically used in small or temporary installations, where data travels from one device to another in a line?
ad hoc mode
you have just changed the IP address on a computer named computer5 in your domain from 172.31.1.10/24 to 172.31.1.110/24. You were communicating with this computer from your workstation fine right before you changed the address. Now when you try the command ping computer5 from your workstation, you don't get a successful reply. Other computers on the network aren't having a problem communicating with the computer. Which commands might help solve the problem? (2)
arp -d, ipconfig /flushdns
Each cable type can transport data at a particular speed only so far before its signals begin to weaken past the point that a receiving station can read them accurately What is the term for this phenomenon?
attenuation
What is a result of absorption on Wi-Fi signals?
attenuation
When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon?
attenuation
which of the following conditions requires cables not to exceed a recommended maximum length?
attenuation
which wireless LAN technology is also called "single frequency radio"?
narrowband radio
A(n) ______________ message is used to determine whether a computer is listening on the network.
ping
What is the term used that defines network cabling between the IDF and MDF?
backbone cabling
interconnects telecommunications closets and equipment rooms
backbone cabling
The network ________ is a measurement of the amount of data that can pass through a network in a certain period of time.
bandwidth
which of the following is a common characteristic of a networking medium? (Choose 3)
bandwidth rating, interference susceptibility, maximum segment length
how devices connected to a hub use network bandwidth
bandwidth sharing
Which UTP limitations can be solved by fiber-optic cable? (choose 3)
bandwidth, EMI susceptibility, segment length
sends a digital signal using the entire bandwidth
baseband
What really determines the bandwidth of a cabling type is how fast a transmitting device, such as a NIC, can generate ___________________ signals on the medium
bit
When referring to network bandwidth, what is the basic unit of measurement?
bits per second
Which of the following is the unit of measurement by which a hub's bandwidth is usually specified? Select one: a. Bytes per second b. Bits per second c. Bytes per minute d. Packets per second
bits per second
A wireless __________ using line-of-sight or broadcast transmissions can extend a wired network over a short distance that would normally require a dedicated communication line from a communications carrier.
bridge
uses an analog signal to send multiple signals simultaneously
broadband
A ______________ frame is a message that is intended to be processed by all devices on the LAN
broadcast
(Ch 2 quiz) A frame with a destination MAC address composed of all binary 1s or FF-FF-FF-FF-FF-FF in hexadecimal is known as which of the following?
broadcast frame
The physical _________ topology is a continuous length of cable connecting one computer to another in daisy-chain fashion and terminated at both ends.
bus
(Ch 2 Test) Which of the following are features of a router? (Choose Two) a. connects computers to the LAN b. connects LANs to one another c. works with MAC addresses d. forwards broadcast packets e. works with packets instead of frames
connects LANs to one another, works with packets instead of frames
When a CPU has two or more processors, each one is referred to as a(n) ________.
core
When two cables run side by side, signals traveling down one wire might interfere with signals traveling on the other wire. What is this phenomenon called?
crosstalk
Which type of interference is caused by wires in the same cabling bundle?
crosstalk
What does the frame trailer consist of in an Ethernet frame?
cyclic redundancy check
What are all of the connections in a network considered, including the cables and their connectors?
cable plant
all the cables and connectors that tie a network together
cable plant
which of the following is a tool needed to make a patch cable? (Choose 21)
cable stripper, crimping tool
A device used to test data flow and between pairs of wires
cable tester
which of the following is a characteristic of fiber-optic cabling? (choose 2)
can be used in electrically noisy environments, carries data over longer distances than UTP does
The physical star topology uses a ___________________ to interconnect computers in a LAN.
central device
Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU?
chipset
can occur when two devices on the same medium transmit simultaneously
collision
Which of the following is defined by the extent to which signals in an Ethernet bus topology network are propagated?
collision domain
when using a ______________ protocol, no lasting connection is made from source to destination
connectionless
Which of the following describes how devices connected to a switch use the speed at which the switch can transmit data?
dedicated bandwidth
how devices connected to a switch use network bandwidth
dedicated bandwitdh
In a computer's IP address settings, the _____________ gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own.
default
What is the main advantage of a point-to-point topology?
data travels on a dedicated link
What is an advantage of a point-to-point topology?
data travels on dedicated link
When using UDP, what name is given to the unit of information the Transport Layer works with?
datagram
the unit of information used by UDP in the Transport layer
datagram
caused by motors, transformers, and fluorescent lights
electromagnetic interference
what are the two types of interference often encountered when using copper media?
electromagnetic interference, radio frequency interference
Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following?
encapsulation
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?
encapsulations
What is the way in which bit signals are represented on the network medium?
encoding
the method used to represent bits on a medium
encoding
what is the process called that determines how bits are represented on the medium?
encoding
which of the following is the process for representing bit signals on the medium?
encoding
connects a corporate network to third-party telecommunications provider
entrance facilities
In a large network, in which several switches need to be connected together, usually one device is placed at the center, forming a(n) ___________ star
extended
what is the name of the most widely used physical topology in networks today?
extended star
A company has just made an agreement with another organization to share their two networks' resources by using TCP/IP protocols. What best describes this arrangement?
extranet
Each component of a computer is designed to perform only one specific task-either input, processing, or output.
false
The length of cable between the wall jack and a patch panel is called vertical cabling.
false
True or False: A client/server network is the simplest network model.
false
True or False: A switch operates just like a hub?
false
True or False: Random access memory (RAM) is considered long-term storage
false
t/f: The IP address 10.240.0.0/8 can't be assigned to a host
false
t/f: cable modem networking is a broadband technology used to deliver Internet access to homes and businesses over CAT7.
false
t/f: Compared to SMF, MMF cable costs more and generally works with laser-based emitters but spans the longest distances and is used in higher-bandwidth applications.
false
t/f: he differences between TCP/IPv4 and TCP/IPv6 are limited to the TCP part of the protocol.
false
t/f: physical topology is how the data travels between computers
false
t/f: the connectors and test equipment required for fiber termination are considerably less expensive than their copper counterparts?
false
t/f: token ring originally operated at 5 Mbps
false
true of False: Switched Ethernet can be implemented over a physical bus topology.
false
An extranet is a private network, such as a school or company network, in which the devices and servers are available only to users connected to the internal network.
false
you have been hired to install a network at a large government agency that wants to reduce the likelihood of electronic eavesdropping on its network. what type of cable is most resistant to eavesdropping?
fiber optic
You're preparing to install a conventional Ethernet network in your new office building, but your boss tells you to be ready to handle a switchover to 1 Gbps Ethernet next year. What types of cable could you install? (choose 2)
fiber optic, cat 6
What type of wiring should be used for a high-speed connection between two buildings?
fiber-optic cabling
The unit of information containing MAC addresses and an error-checking code that's processed by the network interface layer is called a _______________.
frame
Match each item with a statement below: information added to the front end of a chunk of data Answer 1 a network model in which all computers can function as clients or servers as needed Answer 2 the software defining the rules and formats a computer must use when sending information across the network Answer 3 an instance of a processor inside a single CPU chip Answer 4 a networked collection of LANs tied together by devices such as routers Answer 5 a collection of users and computers in a server-based network Answer 6 network that is geographically dispersed Answer 7 a chunk of data with source and destination IP addresses Answer 8 the term used to describe an OS designed mainly to share network resources Answer 9 network that connects devices in a small geographic area
information added to the front end of a chunk of data → header, a network model in which all computers can function as clients or servers as needed → peer-to-peer network, the software defining the rules and formats a computer must use when sending information across the network → network protocols, an instance of a processor inside a single CPU chip → core, a networked collection of LANs tied together by devices such as routers → internetwork, a collection of users and computers in a server-based network → domain, network that is geographically dispersed → WAN, a chunk of data with source and destination IP addresses → packet, the term used to describe an OS designed mainly to share network resources → server, network that connects devices in a small geographic area → LAN
A type of wireless network that uses light beams to send signals between two devices and is highly susceptible to visible light sources is called ___________.
infrared
When a wireless computer connects with an AP before it connects with other devices, it is operating in __________ mode
infrastructure
You are the network administrator for a company and you want to separate the traffic from the accounting department from the rest of the network. However, the accounting department still needs to have access to other network resources. What type of network do you need to implement?
inter-network
A/an ____ is a network of networks or a networked collection of LANs tied together by devices such as routers.
internetwork
You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to the existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?
internetwork
is a networked collection of LANs tied together by devices such as route
internetwork
which of the following is not a type of infrared LAN technology
laser networks
Question text Which of the following describes a hub-based Ethernet network?
logical bus
What type of logical topology does a Wireless LAN use?
logical bus
What type of logical topology is at work when using an Ethernet hub?
logical bus
Which best describes a typical wireless LAN?
logical bus topology
how the data travels from one device to another
logical topology
(Ch 6 Quiz) the IP address 127.0.0.1 is a reserved address because it used for troubleshooting and is known as what?
loopback address
rules governing how media is transmitted and received
media access control
A ______________ topology is fully redundant and is the most expensive to implement.
mesh
connects every device to every other device
mesh topology
Terrestrial and satellite systems are two types of which wireless networking technology?
microwave
Which of the following are examples of output devices? (Choose all that apply.) Select one or more: speakers CPU keyboard printer monitor
monitor, printer, speakers
Which of the following are examples of input devices? (Choose all that apply.) Select one or more: mouse monitor DVD scanner printer
mouse, DVD, scanner
You want a fast CPU for the new computer you are building and your motherboard only has one CPU socket. To increase the processing power, you need a CPU that provides more than one processor. What is this CPU called?
multicore
Match the advantages and disadvantages with the type of network (server vs peer-to-peer). need for administrative personnel to maintain network resources Answer 1 network is a network that has certain computers that take on the role of servers, and all the other computers act as clients. Answer 2 relatively inexpensive to implement Answer 3 advantages: no limitations to the number of users Answer 4 higher costs for equipment and software Answer 5 include lack of security, Answer 6 advantages: easy expandable Answer 7 advantages: better security, Answer 8 limitation on the number of users Answer 9 doesn't require extensive training or special staff Answer 10 Is a collection of computers in which each computer can act as a client or a server, or both, and each has equal authority Answer 11 Loss of a single machine will not cripple the network. Answer 12 easy to install Answer 13 advantages: centralized control over network resources, Answer 14 Difficult to locate resources Answer 15 single computer could cause the entire network to fail
need for administrative personnel to maintain network resources → server-based, network is a network that has certain computers that take on the role of servers, and all the other computers act as clients. → server-based, relatively inexpensive to implement → peer-to-peer network, advantages: no limitations to the number of users → server-based, higher costs for equipment and software → server-based, include lack of security, → peer-to-peer network, advantages: easy expandable → server-based, advantages: better security, → server-based, limitation on the number of users → peer-to-peer network, doesn't require extensive training or special staff → peer-to-peer network, Is a collection of computers in which each computer can act as a client or a server, or both, and each has equal authority → peer-to-peer network, Loss of a single machine will not cripple the network. → peer-to-peer network, easy to install → peer-to-peer network, advantages: centralized control over network resources, → server-based, Difficult to locate resources → peer-to-peer network, single computer could cause the entire network to fail → server-based
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
net view
which command should you use to configure the primary DNS server on your computer?
netsh
At what layer of the TCP/IP protocol suite are packets received and encapsulated to create frames?
network access
What type of indicator lights would you find on a hub (choose three)? a. network activity b. link status c. signal strength d. hub/switch mode e. collision
network activity, link status, collision
The amount of data that can be transferred on a network during a specific interval is called the ________________________________. Select one: a. Duplexing speed b. Line speed rating c. Network speed rating d. Network bandwidth
network bandwidth
amount of data that can be transferred on a network
network bandwidth
In Windows 10, which of the following displays information about currently installed NICs? Select one: a. NICs and Drivers b. Computers and Devices c. Network Connections d. Local Area Networks
network connections
Which part of the network communication process is responsible for sending and receiving data to and from the network media?
network interface
device that connects a computer with the network medium
network interface card
Air waves are an example of what type of network component?
network medium
TCP/IP is an example of which of the following? Select one: a. Network server b. Device driver c. Network protocol d. NIC e. Network client
network protocol
__________________ is the term used to describe the method a network interface uses to access the medium and send data frames and the structure of these frames.
network technology
what's the term for each grouping of 8 bits in an IP address?
octet
With which kind of Wi-Fi antennas does the signal radiate out with equal strength in all directions?
omnidirectional
In which type of Wi-Fi antenna do signals radiate out from the antenna with equal strength in all directions?
omnidirectional antenna
in which type of Wi-Fi antenna do signals radiate out from the antenna with equal strength in all directions?
omnidirectional antenna
Which of the following is NOT a characteristic of Unshielded Twisted Pair cabling?
operates in half-duplex only
Which of the following is true of IEEE 802.3an?
operates only in full duplex mode
Which of the following is a top-level domain name?
org
components include devices such as printers, disk drives, network cards, and monitors.
output
After the Internetwork layer places its header on a datagram, what is the unit of information is referred to?
packet
Before data is transmitted, it is broken into chunks of data and then encapsulated with the source and destination IP addresses to create a _______.
packet
What is the more well-known term for chunks of data sent across the network?
packet
Which of the following is a length of cable that connects a computer to either a networking device or to an RJ-45 jack?
patch cable
connects a patch panel port to a switch or hub
patch cable
which is the name of the cable is a short cable for connecting a computer to an RJ-45 jack or connecting a patch panel port to a switch or hub?
patch cable
which of the following is a component of a structured cabling system? (Choose 2)
patch cables, horizontal wiring
Which topology most likely uses coaxial cabling?
physical bus
(ch. 3 review) Which of the following describes the arrangement of network cabling between devices?
physical topology
how the cables connect one device to another
physical topology
Put the boot process in order The CPU gets the configuration information from the BIOS and carries out the startup routines, which include performing the POST. power is supplied to the motherboard. the CPU starts. The OS is loaded into RAM The BIOS searches the boot devices for an OS. The OS services are started.
power is supplied to the motherboard. → 1 the CPU starts. → 2, The CPU gets the configuration information from the BIOS and carries out the startup routines, which include performing the POST. → 3 The BIOS searches the boot devices for an OS. → 4 The OS is loaded into RAM → 5, , The OS services are started. → 6
(Ch 5 Quiz) When a set of protocols work together cooperatively it is called a ________.
protocol suite/ protocol stack
_________ are sets of rules and procedures that dictate communication and behavior.
protocols
Which of the following is NOT an advantage of a physical star?
provides redundancy and fault tolerance
Which of the following is not a form of electromagnetic interference, or EMI?
rain/fog
What does a repeater do? Select one: a. It listens on a network for collisions and informs the sending and computer to resend their data again. b. receives bit signals generated by NICs and other devices, rebuilds the reads the MAC address, and then sends them to the correct port. c. receives bit signals generated by NICs and other devices, strengthens them, and then sends them along or repeating them to other parts of the network. d. receives bit signals generated by NICs and other devices, strengthens them, and then sends them to all devices connected to the LAN.
receives bit signals generated by NICs and other devices, strengthens them, and then sends them along or repeating them to other parts of the network.
device that only regenerates incoming signals
repeater
which command should you use with a dual-homed server to make sure the server sends packets out the correct interface?
route
device that connects LANs
router
which of the following is needed if a computer with the IP address 172.31.210.10/24 wants to communicate with a computer with the IP address 172.31.209.122/24?
router
Which type of wireless technology bounces transmissions off walls and ceilings to deliver signals from sender to receiver and is often used with TV remotes?
scatter infrared
Which type of Wi-Fi signal interference is most likely to be caused by leaves on trees?
scattering
(CH.1 review questions) The time it takes for read/write heads to move to the correct spot on the platter is the ____________
seek time
The Transport layer deals with which unit of information?
segment
Which of the following is a feature of TCP? (Choose 3.) a. segments data into chunks b. converts signals into bits c. provides data-formatting services d. ensures flow control e. establishes a connection
segments data into chunks, ensures flow control, establishes a connection
The client/server networking model may also be known by which of the following terms? Select one: a. Peer-to-peer b. Server-based c. Intranet d. Workgroup
server based
In a physical bus topology, both ends of the medium must be terminated in order to prevent what?
signal bounce
name the two main types of fiber optic cable
single-mode, multimode
What type of wireless technology is used for 802.11b /g /n networks?
spread-spectrum radio
which type of fiber connector locks onto the jack when twisted?
straight tip (ST)
What is the term used that defines network cabling in the work area and between telecommunications closets and equipment rooms?
structured cabling
what is the name of the process of dividing a single network address into two or more subnetwork addresses, each with fewer available host IDs than the original network address.
subnetting